Masking based Data Hiding and Image Authentication Technique (MDHIAT)
暂无分享,去创建一个
[1] Kian-Lee Tan,et al. Steganographic schemes for file system and B-tree , 2004, IEEE Transactions on Knowledge and Data Engineering.
[2] Chien-Chang Chen,et al. Robust image authentication method surviving JPEG lossy compression , 1997, Electronic Imaging.
[3] Sorina Dumitrescu,et al. Detection of LSB Steganography via Sample Pair Analysis , 2002, Information Hiding.
[4] Ning Liu,et al. Statistically Secure Digital Image Data Hiding , 2005, 2005 IEEE 7th Workshop on Multimedia Signal Processing.
[5] Nameer N. El-Emam. Hiding a Large Amount of Data with High Security Using Steganography Algorithm , 2007 .
[6] Nasir D. Memon,et al. Analysis of LSB based image steganography techniques , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).
[7] Vincent Rijmen,et al. The NIST Cryptographic Workshop on Hash Functions , 2006, IEEE Secur. Priv..
[8] V. Sridhar,et al. Multivariate entropy detector based hybrid image registration , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..
[9] G. Wornell,et al. Quantization index modulation: a class of provably good methods for digital watermarking and information embedding , 2000, 2000 IEEE International Symposium on Information Theory (Cat. No.00CH37060).
[10] Pierre Moulin,et al. A framework for evaluating the data-hiding capacity of image sources , 2002, IEEE Trans. Image Process..
[11] Joseph A. O'Sullivan,et al. Information-theoretic analysis of information hiding , 2003, IEEE Trans. Inf. Theory.